- According to the Verizon Data Breach Investigation Report: 61% of breaches occurred in smaller businesses last year.
- According to UPS Capital: Breaches cost small businesses between $84,000 and $148,000 33% of firms required 3+ days to recover.
- According to the FBI, 84% of computer attacks are inside jobs.

Checklist
This course is taught as a self-paced online course and in a classroom setting.
-
Instruction by an expert facilitator
-
Online assistance
-
Specialized online manual and course materials
-
Personalized certificate as a Certified Cyber Crime Consultant
Course Objectives
- Effectively protect websites from being hacked.
- Demonstrate an understanding of professional, ethical and legal issues as it relates to cyber crime.
- Effectively investigate cyber extortion and cyber blackmail cases.
- Articulate oral and written skills necessary to develop company security policies.
- Effectively assess employee risks.
- Demonstrate an ability to perform penetration tests.
- Demonstrate an understanding of how internet scams are committed and how to investigate them.
- Demonstrate an ability to assess any business, or government agency on their physical and network vulnerabilities.
- Utilize techniques to effectively profile a cyber criminal.
- Demonstrate an ability to perform basic cell phone and tablet computer forensics.
- Understand how to teach parents about Online Child Safety.
- Social Media investigation.
- How to install and remove malware and viruses.
- How to consult with entertainers, athletes, celebrities, small businesses, corporations and governments agencies.
- How to start your own cyber security company.
- How to market your skill sets.
- How to build your own "Hacker For Hire" service legally.
- How to remove links from Google.
All Students Will Receive A Certificate Of Completion
Certified Cyber Crime Consultant.

Course Curriculum
-
-
Support
-
About This Course
-
Download Security And Acronyms Definitions
-
What Every Cyber Security Consultant Should Have
-
100 Hacking Tools and Resources
-
-
-
About This Course
-
What About The Geek Squad?
-
IT Manager, Computer Security Expert Or Hacker
-
Having A Career In IT And/Or Cyber Security
-
Basic Computer Problem
-
Jack Of All Trades
-
Don't Be Shy
-
Become A Teacher
-
Speak Less
-
The Basic Networking
-
Can You Trace A Network
-
Latency And Bandwidth
-
Do You Understand Script Writing
-
Backups Then Backup Again
-
Storing Your Password
-
Hard Work
-
Become A Project Manager
-
Understanding The Business Side
-
Don't Be Afraid To Debate
-
Always Have A Solutions
-
Ask Questions
-
Book Smart Vs. Street Smart
-
-
-
About This Chapter
-
Understanding Your Role As A Certified Cyber Crime Consultant
-
Ethics In Cyber/Computer Security
-
10 Leadership Qualities
-
Agent of the Government
-
Ethics And Leadership Quiz
-
-
-
About This Chapter
-
12 Things Every Leader Should Do To Prevent Cyber Attacks
-
-
-
Overview Of Cyber Insurance
-
Proof That Hacking Is Bigger Than All Drug Trafficking In The World!
-
What Does Cyber Insurance Cover?
-
Ten Things You Need To Know About Cyber Security Insurance
-
The Different Types Of Cyber Insurance
-
What Is Covered by Third-Party Cyber Insurance?
-
What Is Covered By First-Party Cyber Insurance?
-
What Is Not Covered By Cyber Insurance?
-
Determining Your Cyber Insurance Coverage Needs
-
Cyber Insurance Checklist
-
-
-
What Is A CIO?
-
What Is A CTO?
-
What Is A CISO?
-
What Is A IT Manager?
-
How to Assess an IT Department
-
Layering For Security
-
DMZ
-
VLAN's
-
NAT
-
Rogue IT Manager
-
Disabling The Windows Command Prompt
-
How to Disable USB Ports On Windows Machines
-
How to Disable USB Ports - Mac OS
-
The Difference Between A Server And A PC
-
Disabling The Windows Command Prompt
-
Securing Corporate Sensitive Data
-
Completely Erasing Data From A Disk
-
What Is a Proxy Server
-
Hiding Data Using Steganography
-
Steganography
-
Quiz
-
Network Topology Discovery Using Software Tools
-
Setting Up Remote Access Authentication
-
Additional Switch Hardening Techniques
-
Implementing A Secure Network Design
-
Secure Network Architecture Concepts
-
Additional Switch Hardening Techniques
-
Host Health Checks
-
Implementing A Secure Network Design
-

About this course
- 4 x $200.00
- 472 lessons
- 17.5 hours of video content
Learn How To Become A Spy

Learn Counter Surveillance

Included In This Course
USB RUBBER DUCKY

GET ONE OF THE FOLLOWING SHIRTS UPON COMPLETIONS
Once you complete this course, you will receive a free Certified Cyber Crime Consultant Shirt.
Pricing options
Download The National Cyber Security University App For Discount Codes.
-
4 x $200.00
Regular price
-
$700.00
Save $100